Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.58657
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200710-09 (nx, nxnode)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200710-09.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200710-09.

Vulnerability Insight:
NX in the 2.1 series uses XFree86 4.3 code which is prone to an integer
overflow vulnerability.

Solution:
All NX users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/nx-3.0.0'

All NX Node users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/nxnode-3.0.0-r3'

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-1861
1016522
http://securitytracker.com/id?1016522
102705
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
18034
http://www.securityfocus.com/bid/18034
20060612 rPSA-2006-0100-1 freetype
http://www.securityfocus.com/archive/1/436836/100/0/threaded
20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
20100
http://secunia.com/advisories/20100
20525
http://secunia.com/advisories/20525
20591
http://secunia.com/advisories/20591
20638
http://secunia.com/advisories/20638
20791
http://secunia.com/advisories/20791
21000
http://secunia.com/advisories/21000
21062
http://secunia.com/advisories/21062
21135
http://secunia.com/advisories/21135
21385
http://secunia.com/advisories/21385
21701
http://secunia.com/advisories/21701
23939
http://secunia.com/advisories/23939
27162
http://secunia.com/advisories/27162
27167
http://secunia.com/advisories/27167
27271
http://secunia.com/advisories/27271
33937
http://secunia.com/advisories/33937
35200
http://secunia.com/advisories/35200
35204
http://secunia.com/advisories/35204
35233
http://secunia.com/advisories/35233
ADV-2006-1868
http://www.vupen.com/english/advisories/2006/1868
ADV-2007-0381
http://www.vupen.com/english/advisories/2007/0381
APPLE-SA-2009-02-12
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
DSA-1095
http://www.debian.org/security/2006/dsa-1095
FEDORA-2009-5558
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
FEDORA-2009-5644
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
GLSA-200607-02
http://security.gentoo.org/glsa/glsa-200607-02.xml
GLSA-200710-09
http://www.gentoo.org/security/en/glsa/glsa-200710-09.xml
MDKSA-2006:099
http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
RHSA-2006:0500
http://www.redhat.com/support/errata/RHSA-2006-0500.html
RHSA-2009:0329
http://www.redhat.com/support/errata/RHSA-2009-0329.html
RHSA-2009:1062
http://www.redhat.com/support/errata/RHSA-2009-1062.html
SUSE-SA:2006:037
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
SUSE-SR:2007:021
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
USN-291-1
https://usn.ubuntu.com/291-1/
freetype-lwfn-overflow(26553)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26553
http://sourceforge.net/project/shownotes.php?release_id=416463
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8
https://bugzilla.redhat.com/show_bug.cgi?id=502565
https://issues.rpath.com/browse/RPL-429
oval:org.mitre.oval:def:9124
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.